Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
internet
biblio
Identity theft on e-government/e-governance digital forensics
Submitted by grigby1 on Fri, 10/16/2020 - 10:22am
blockchain technology
collaboration
Computer crime
corporate users
credit card fraud
credit card transactions
Credit cards
credit transactions
cyber-threats
Cybercrime
Cybersecurity
cyberspace-low entry barriers
Digital Forensics
E-Governance
E-Government
electronic commerce
Electronic government
financial fraud
fraud
fraudulent transactions
genetic algorithms
Government
government data processing
governments
identity theft
internet
Law
malicious online activity
Neural networks
policy-based governance
product reviews
pubcrawl
resilience
Resiliency
system intrusions
time 13.0 month
user anonymity
biblio
Inclusive Security Models To Building E-Government Trust
Submitted by grigby1 on Fri, 10/16/2020 - 10:14am
Access Control
authentication
authorisation
authorization
collaboration
Cybersecurity
data privacy
e-gov
E-Government
e-government trust
government data processing
Human behavior
inclusive security
inclusive security model
internet
message authentication
nonrepudiation properties
policy-based governance
privacy
privacy properties
privacy relationships
Privacy Requirements
pubcrawl
resilience
Resiliency
security perspective
security requirements
security threats
trust
trust of government
Trusted Computing
trusted security solution
biblio
A Study on The Factors Affecting The Continuous Use of E-Government Services - Focused on Privacy and Security Concerns-
Submitted by grigby1 on Fri, 10/16/2020 - 10:10am
4th Industrial Revolution
Acceptance intention of E-government
collaboration
continuous use intention
Cybersecurity
data privacy
E-Government
e-government service
e-government services
Electronic government
government data processing
Human behavior
information and communication technology
information quality
information system
Information systems
internet
IS access model
Personnel
policy-based governance
privacy
privacy concerns
pubcrawl
quality factors
Quality of E-Government Services
quality of service
Reliability of E-government
resilience
Resiliency
risk factors
security
security concerns
service quality
Smart PLS
SPSS
system quality
TAM
technology acceptance model
user satisfaction
User satisfaction of E-Government Services
biblio
Assessing E-Security Behavior among Students in Higher Education
Submitted by aekwall on Mon, 10/12/2020 - 10:45am
authorisation
malware
invasive software
Electronic mail
Human behavior
pubcrawl
Computer crime
internet
Cybersecurity
password
Phishing
Human Factors
data handling
behavior
Educational institutions
social engineering
E-security awareness
e-security behavior assessment
further education
higher education students
higher educational institutions
online scam
password usage
Security Behavior Survey Instrument
United Arab Emirates
Human Behavior and Cybersecurity
biblio
SMSBotHunter: A Novel Anomaly Detection Technique to Detect SMS Botnets
Submitted by aekwall on Mon, 10/12/2020 - 10:43am
botnet
Servers
malware
invasive software
mobile computing
feature extraction
Human behavior
pubcrawl
Mobile handsets
Cryptography
internet
Training
electronic messaging
Anomaly Detection
anomaly detection technique
dynamic analysis
SMS messages
detect SMS botnets
mobile botnets
one-class classification
SMS botnet
SMS spammer botnets
SMS stealer botnets
SMSBotHunter
Human Behavior and Cybersecurity
biblio
An approach to Privacy on Recommended Systems
Submitted by aekwall on Mon, 10/12/2020 - 10:31am
security
Scalability
History
Human behavior
pubcrawl
privacy
Facebook
social networking (online)
internet
Data protection
social networks
Companies
data privacy
user security
Human Factors
user privacy
recommender systems
Europe
expert systems
website
online companies
privacy protection techniques
recommended systems
referral systems
users personal information
Expert Systems and Privacy
biblio
Availability as a Metric for Region-Scale Telecommunication Designs
Submitted by grigby1 on Tue, 10/06/2020 - 12:50pm
availability characteristic
Buildings
Communication channels
Computing Theory
internet
Measurement
Metrics
network availability
network growth process
Passive optical networks
pubcrawl
qualitative characteristics
queuing theory
region-scale telecommunication designs
regional scale networks
Routing
Routing protocols
Security Metrics
simulation modeling
telecommunication network planning
biblio
TVis: A Light-weight Traffic Visualization System for DDoS Detection
Submitted by grigby1 on Tue, 10/06/2020 - 12:41pm
acute attacks
anomaly detection system
Computer crime
computer network security
Computing Theory
data visualisation
Data visualization
DDoS Attack
denial-of-service attack
distributed DoS attacks
external network traffic
graph theory
Heron's triangle-area mapping
high-rate DDoS detection
highrate DDoS attacks
interactive visualization system
internal network traffic
internet
IP networks
light-weight traffic visualization system
low-rate attacks
microsoft windows
Monitoring
network defenders
network size
network traffic
networked computers
offline modes
online and offline
pubcrawl
resilience
Resiliency
telecommunication traffic
time 5.0 s
triangle-area
TVis
undirected graph
visual observations
visualization
biblio
Research on Node Routing Security Scheme Based on Dynamic Reputation Value in Content Centric Networks
Submitted by aekwall on Mon, 10/05/2020 - 10:59am
computer network security
Servers
security
Resiliency
pubcrawl
composability
Routing
Metrics
internet
telecommunication network routing
Heuristic algorithms
security issues
Law
Gold
CCN network
content centric networks
defensing
dynamic reputation value
node routing attacks
node routing security scheme
normal user requests
routing advantages
Dynamic Networks and Security
biblio
Research and Implementation of Mobile Application Security Detection Combining Static and Dynamic
Submitted by aekwall on Mon, 10/05/2020 - 10:54am
security of data
Servers
security
mobile computing
Resiliency
pubcrawl
composability
Metrics
internet
client-server systems
Mobile Applications
Fingerprint recognition
Engines
automated platform for security detection of mobile application system
capture mobile application traffic
client security detection
fuzzy testing method
mobile application client
mobile application security detection
mobile application traffic
mobile intelligent terminals trend
Packaging
security detection combining static and dynamic
security detection of mobile application
server security detection
Dynamic Networks and Security
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »